Home
last modified time | relevance | path

Searched refs:slen (Results 1 – 15 of 15) sorted by relevance

/openthread-latest/third_party/mbedtls/repo/library/
Dbase64.c62 const unsigned char *src, size_t slen) in mbedtls_base64_encode() argument
68 if (slen == 0) { in mbedtls_base64_encode()
73 n = slen / 3 + (slen % 3 != 0); in mbedtls_base64_encode()
87 n = (slen / 3) * 3; in mbedtls_base64_encode()
102 if (i < slen) { in mbedtls_base64_encode()
104 C2 = ((i + 1) < slen) ? *src++ : 0; in mbedtls_base64_encode()
110 if ((i + 1) < slen) { in mbedtls_base64_encode()
129 const unsigned char *src, size_t slen) in mbedtls_base64_decode() argument
140 for (i = n = 0; i < slen; i++) { in mbedtls_base64_decode()
143 while (i < slen && src[i] == ' ') { in mbedtls_base64_decode()
[all …]
Dpkcs5.c270 size_t plen, const unsigned char *salt, size_t slen, in pkcs5_pbkdf2_hmac() argument
298 if ((ret = mbedtls_md_hmac_update(ctx, salt, slen)) != 0) { in pkcs5_pbkdf2_hmac()
360 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() argument
364 return pkcs5_pbkdf2_hmac(ctx, password, plen, salt, slen, iteration_count, in mbedtls_pkcs5_pbkdf2_hmac()
371 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac_ext() argument
389 ret = pkcs5_pbkdf2_hmac(&md_ctx, password, plen, salt, slen, in mbedtls_pkcs5_pbkdf2_hmac_ext()
Dbignum.c515 size_t i, j, slen, n; in mbedtls_mpi_read_string() local
536 slen = strlen(s); in mbedtls_mpi_read_string()
539 if (slen > SIZE_MAX >> 2) { in mbedtls_mpi_read_string()
543 n = BITS_TO_LIMBS(slen << 2); in mbedtls_mpi_read_string()
548 for (i = slen, j = 0; i > 0; i--, j++) { in mbedtls_mpi_read_string()
555 for (i = 0; i < slen; i++) { in mbedtls_mpi_read_string()
702 size_t slen; in mbedtls_mpi_read_file() local
719 slen = strlen(s); in mbedtls_mpi_read_file()
720 if (slen == sizeof(s) - 2) { in mbedtls_mpi_read_file()
724 if (slen > 0 && s[slen - 1] == '\n') { in mbedtls_mpi_read_file()
[all …]
Decdsa.c611 size_t *slen) in ecdsa_signature_to_asn1() argument
631 *slen = len; in ecdsa_signature_to_asn1()
642 unsigned char *sig, size_t sig_size, size_t *slen, in mbedtls_ecdsa_write_signature_restartable() argument
676 MBEDTLS_MPI_CHK(ecdsa_signature_to_asn1(&r, &s, sig, sig_size, slen)); in mbedtls_ecdsa_write_signature_restartable()
691 unsigned char *sig, size_t sig_size, size_t *slen, in mbedtls_ecdsa_write_signature() argument
696 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature()
705 const unsigned char *sig, size_t slen) in mbedtls_ecdsa_read_signature() argument
708 ctx, hash, hlen, sig, slen, NULL); in mbedtls_ecdsa_read_signature()
716 const unsigned char *sig, size_t slen, in mbedtls_ecdsa_read_signature_restartable() argument
721 const unsigned char *end = sig + slen; in mbedtls_ecdsa_read_signature_restartable()
Drsa.c1618 size_t slen, mbedtls_md_type_t md_alg) in mgf_mask() argument
1657 if ((ret = mbedtls_md_update(&md_ctx, src, slen)) != 0) { in mgf_mask()
1694 const unsigned char *salt, size_t slen, in hash_mprime() argument
1720 if ((ret = mbedtls_md_update(&md_ctx, salt, slen)) != 0) { in hash_mprime()
2123 size_t slen, min_slen, hlen, offset = 0; in rsa_rsassa_pss_sign_no_mode_check() local
2171 slen = hlen; in rsa_rsassa_pss_sign_no_mode_check()
2173 slen = olen - hlen - 2; in rsa_rsassa_pss_sign_no_mode_check()
2178 slen = (size_t) saltlen; in rsa_rsassa_pss_sign_no_mode_check()
2185 p += olen - hlen - slen - 2; in rsa_rsassa_pss_sign_no_mode_check()
2190 if ((ret = f_rng(p_rng, salt, slen)) != 0) { in rsa_rsassa_pss_sign_no_mode_check()
[all …]
Dpsa_crypto_rsa.c462 int slen = rsa_pss_expected_salt_len(alg, rsa, hash_length); in mbedtls_psa_rsa_verify_hash() local
468 slen, in mbedtls_psa_rsa_verify_hash()
Dssl_tls.c401 typedef int (*tls_prf_fn)(const unsigned char *secret, size_t slen,
430 static int tls_prf_sha256(const unsigned char *secret, size_t slen,
441 static int tls_prf_sha384(const unsigned char *secret, size_t slen,
467 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf() argument
491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf()
6747 const unsigned char *secret, size_t slen, in tls_prf_generic() argument
6771 if (slen != 0) { in tls_prf_generic()
6777 status = psa_import_key(&key_attributes, secret, slen, &master_key); in tls_prf_generic()
6827 const unsigned char *secret, size_t slen, in tls_prf_generic() argument
6868 ret = mbedtls_md_hmac_starts(&md_ctx, secret, slen); in tls_prf_generic()
[all …]
Dssl_misc.h581 typedef int mbedtls_ssl_tls_prf_cb(const unsigned char *secret, size_t slen,
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Decdsa.h475 unsigned char *sig, size_t sig_size, size_t *slen,
522 unsigned char *sig, size_t sig_size, size_t *slen,
556 const unsigned char *sig, size_t slen);
591 const unsigned char *sig, size_t slen,
Dbase64.h46 const unsigned char *src, size_t slen);
66 const unsigned char *src, size_t slen);
Dpkcs5.h151 size_t plen, const unsigned char *salt, size_t slen,
177 size_t slen,
Dssl.h5587 const unsigned char *secret, size_t slen,
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ecdsa.function437 size_t slen;
450 slen = sizeof(sig);
459 &slen,
466 TEST_ASSERT(slen == sig_check->len);
467 TEST_ASSERT(memcmp(sig, sig_check->x, slen) == 0);
481 &slen,
Dtest_suite_pk.function1260 size_t slen;
1279 slen = sizeof(sig);
1283 sig, sizeof(sig), &slen,
1289 TEST_ASSERT(slen == sig_check->len);
1290 TEST_ASSERT(memcmp(sig, sig_check->x, slen) == 0);
1298 hash->x, hash->len, sig, slen, &rs_ctx);
1308 hash->x, hash->len, sig, slen, &rs_ctx);
1317 hash->x, hash->len, sig, slen, &rs_ctx);
1321 slen = sizeof(sig);
1323 sig, sizeof(sig), &slen,
Dtest_suite_psa_crypto.data4602 PSA verify hash: RSA-1024 PSS SHA-256, slen=0 (bad)
4606 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=0
4610 PSA verify hash: RSA-1024 PSS SHA-256, slen=31 (bad)
4614 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=31
4618 PSA verify hash: RSA-1024 PSS SHA-256, slen=32
4622 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=32
4626 PSA verify hash: RSA-1024 PSS SHA-256, slen=94 (bad)
4630 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=94
4634 PSA verify hash: RSA-1024 PSS SHA-512, slen=61 (bad)
4638 PSA verify hash: RSA-1024 PSS-any-salt SHA-512, slen=61
[all …]